Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is Trigger?
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. Triggers are kept in and managed by the DBMS. Triggers are used to maintain the referential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or implemented; DBMS automatically fires the trigger as a result of a data modification to the associated table. Triggers can be viewed as same to stored procedures in that both having of procedural logic that is kept at the database level. Stored procedures, though, are not event-drive and are not attached to a specific table as triggers are. Stored procedures are explicitly implemented by invoking a CALL to the procedure whereas triggers are implicitly executed. In addition, triggers can also execute stored procedures.
For each 1: n relationship type R involving two entities E1 and E2, we recognize the entity type (say E1) at the n-side of the relationship type R and contain primary key of the en
What is Derived and stored Attribute? Derived and Stored Attribute - In a few cases, two or more attribute values are associated, for example, Age and BirthDate attributes of a
Explain Alternate key? Alternate Key - All the candidate keys except primary key are known as alternate keys.
In problems 1 - 4, you are given the columns of a table, and a set of functional dependencies. Determine the normal form of this table. Remember that the normal form is the HIGHE
Explain the Deferred Update The deferred update methods do not physically update the database on disk till after a transaction reaches its commit point; after that the updates
What is abstraction? Abstraction in the object orientation is a idea that provide opportunity to express necessary properties of object without providing much details of the im
Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,
Differentiate between join and outer join? Outer joins return all rows from at least one of the tables or views mentioned within the FROM clause, as long as those rows get toge
Task Partitioning, Sequencing and Project Planning The tasks required for the service might be broadly partitioned into: 0. Set up database tables and account file
Problem: ‘Users and Information system specialists need to spend inordinate amounts of time locating and gathering data' (Watson and Hal, 1998) Recent developments in the ar
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd